Yingyou Wen

Orcid: 0000-0002-6659-1785

According to our database1, Yingyou Wen authored at least 48 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Systems engineering issues for industry applications of large language model.
Appl. Soft Comput., January, 2024

2023
Automatic design of machine learning via evolutionary computation: A survey.
Appl. Soft Comput., August, 2023

Information-centric vehicular social network routing scheme in smart city.
Internet Technol. Lett., 2023

KnowledgeNavigator: Leveraging Large Language Models for Enhanced Reasoning over Knowledge Graph.
CoRR, 2023

A Large-Scale Multi-objective Brain Storm Optimization Algorithm Based on Direction Vectors and Variance Analysis.
Proceedings of the Advances in Swarm Intelligence - 14th International Conference, 2023

Neural Architecture Search Based on Improved Brain Storm Optimization Algorithm.
Proceedings of the Advances in Swarm Intelligence - 14th International Conference, 2023

2022
Multi-context unsupervised domain adaption for HEp-2 cell classification using maximum partial classifier discrepancy.
J. Supercomput., 2022

A HEp-2 Cell Image Classification Model Based on Deep Residual Shrinkage Network Combined with Dilated Convolution.
Proceedings of the Intelligent Information Processing XI, 2022

2019
Coverage Degree-Coverage Model in Wireless Visual Sensor Networks.
IEEE Wirel. Commun. Lett., 2019

Optimal Utility of Vehicles in LTE-V Scenario: An Immune Clone-Based Spectrum Allocation Approach.
IEEE Trans. Intell. Transp. Syst., 2019

2018
Identifying localization attacks in wireless sensor networks using deep learning.
J. Intell. Fuzzy Syst., 2018

Pedestrian Dead-Reckoning Indoor Localization Based on OS-ELM.
IEEE Access, 2018

2017
Robust positioning algorithm based on relative location map for mobile wireless sensor networks.
J. Intell. Fuzzy Syst., 2017

Energy-Efficient Virtual Resource Dynamic Integration Method in Cloud Computing.
IEEE Access, 2017

Cache-Enabled Device to Device Networks With Contention-Based Multimedia Delivery.
IEEE Access, 2017

3D visual correlation model for wireless visual sensor networks.
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017

2016
Energy Efficient Moving Target Tracking in Wireless Sensor Networks.
Sensors, 2016

A Novel Greedy Optimization Localization Algorithm for Wireless Sensor Networks in a Concave Area.
Ad Hoc Sens. Wirel. Networks, 2016

2015
Secure Data Fusion in Wireless Multimedia Sensor Networks via Compressed Sensing.
J. Sensors, 2015

Bicriteria Optimization in Wireless Sensor Networks: Link Scheduling and Energy Consumption.
J. Sensors, 2015

A Two-Stage Range-Free Localization Method for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Study on the Similarity Query Based on LCSS over Data Stream Window.
Proceedings of the 12th IEEE International Conference on e-Business Engineering, 2015

2014
Secure Data Aggregation in Wireless Multimedia Sensor Networks Based on Similarity Matching.
Int. J. Distributed Sens. Networks, 2014

Distributed Movement Control for Building a Ring in Mobile Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

A Localization Algorithm for Wireless Sensor Networks.
Proceedings of the Frontiers in Internet Technologies, 2014

2013
A service-integrated sensor network middleware applied to industrial solutions of IoT related.
Telecommun. Syst., 2013

A Determination Algorithm for Probability Density about Uncertain Data Streams Based on GMM.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Design of an OSGi-Based WSN Gateway.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

A Prediction Algorithm for Real-Time Video Traffic Based on Wavelet Packet.
Proceedings of the Frontiers in Internet Technologies, 2013

2011
Mobile Platform and Secure Access Approach of UMTS Terminal Based on Trusted Computing.
J. Networks, 2011

Security Issues and Solutions in 3G Core Network.
J. Networks, 2011

The Four Corners DV-Hop Localization Algorithm for Wireless Sensor Network.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A Middleware Architecture for Sensor Networks Applied to Industry Solutions of Internet of Things.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

2010
A Sheme of Mobile Platform Based on Trusted Computing.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

Securing GPRS Tunnel Protocol in 3G Core Network.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

Efficient link scheduling for TDMA based WMN using multi-objective genetic algorithm.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

2009
Multi-objective optimization for coverage control in wireless sensor network with adjustable sensing radius.
Comput. Math. Appl., 2009

KDSR: An Efficient DHT-Based Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Optimization of Resource Allocation in Multi-radio Multi-channel Wireless Mesh Networks.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A genetic approach to channel assignment for multi-radio multi-channel wireless mesh networks.
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, 2009

Modeling and extending lifetime of wireless sensor networks using genetic algorithm.
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, 2009

2008
A Certificate-Based Authenticated Key Agreement Protocol for SIP-Based VoIP Networks.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

An Enhanced Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

SPIT Detection and Prevention Method in VoIP Environment.
Proceedings of the The Third International Conference on Availability, 2008

2007
Detecting early worm propagation based on entropy.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms.
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007

Formal Analysis of Secure Bootstrap in Trusted Computing.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2004
Optimizing Sensor Node Distribution with Genetic Algorithm in Wireless Sensor Network.
Proceedings of the Advances in Neural Networks, 2004


  Loading...